Category Archives: For Business

7 Examples of Malicious Code to Keep in Mind

Believe it or not, malicious code has been around for half a century already. What started as an education lab experiment made its way into the wild, wreaking havoc on companies and home users alike. Famous examples of malicious code criminal activity in recent history include the 2019 Texas ransomware attack or the 2018 Trojan […]

The post 7 Examples of Malicious Code to Keep in Mind appeared first on Heimdal Security Blog.

How to Report Email Fraud: Learn What to Do If It Happens to You

Have you, a colleague or a friend ever received a suspicious email? It is of paramount importance to know how to report email fraud in order to avoid all the unpleasant consequences that might come from it, especially if we’re talking about the compromise of your business email – revenue loss, data breach, reputation damage, […]

The post How to Report Email Fraud: Learn What to Do If It Happens to You appeared first on Heimdal Security Blog.

Machine Learning in Cybersecurity: The New Essential for Enhanced Performance

Machine learning is usually mentioned in contexts that actually refer to artificial intelligence or used as a synonym. Let us have a closer look at what the terms artificial intelligence, machine learning and deep learning (another common notion used in relation to AI) really mean. We will also discuss how we can use machine learning […]

The post Machine Learning in Cybersecurity: The New Essential for Enhanced Performance appeared first on Heimdal Security Blog.

What is a Malicious App and How to Spot One?

We’re all familiar with terms such as “threat-hunting”, “boots on the ground Intelligence” or “DNS traffic filtering.” Going back to one’s roots is always a good idea and today I’ll do just that. This article is dedicated to malicious applications. Indeed, we are going to talk about the malicious app definition, what makes an app […]

The post What is a Malicious App and How to Spot One? appeared first on Heimdal Security Blog.

The Cyber Kill Chain Model: A Comprehensive Guide

The cyber kill chain model offers a detailed perspective and the appropriate methods to recognize incidents surrounding an attack against an organization. This model allows security teams to impede the assault during a certain stage and consequently design stronger security and enhance their incident response and analysis capabilities. Throughout the past couple of decades, cyber […]

The post The Cyber Kill Chain Model: A Comprehensive Guide appeared first on Heimdal Security Blog.

Artificial Intelligence in Cybersecurity: The Culture of the Future

Have you ever wondered what intelligence means? This characteristic of humans encompasses – but it’s not limited to – learning, reasoning, problem-solving, perception and the use of language. These are also the characteristics that AI researchers have focused on, in order to find solutions for various aspects of our society today. The one we’ll focus […]

The post Artificial Intelligence in Cybersecurity: The Culture of the Future appeared first on Heimdal Security Blog.

Egregor Ransomware: Origins, Operating Mode, Recent Incidents

A new year brings about countless new opportunities, but also, unfortunately, the chance for previous menaces to grow and evolve. Such is the case with Egregor ransomware. Since anticipation and prevention are more than welcome, let’s find out more about it and what you can do to combat it in order to keep your business […]

The post Egregor Ransomware: Origins, Operating Mode, Recent Incidents appeared first on Heimdal Security Blog.